SlideShare uma empresa Scribd logo
1 de 28
AWS Security Strategy
Enterprise Security on AWS
Teri Radichel, Cloud Architect | WatchGuard Technologies | @teriradichel
The CIO of the
5th largest bank
in the US says
they can be
more secure in
AWS than in
their own
data center.
Possible?
About That Internet Thing…
You are already
using shared
infrastructure.
How do you
secure it?
Security Policy
Yours.
Do you know what it says?
Does everybody follow it?
AWS.
https://d0.awsstatic.com/whitepapers/a
ws-security-whitepaper.pdf
What’s In Your Network?
Do you really know?
Automated Configuration
AWS facilitates
automated
infrastructure
and application
deployment via
code stored in
source control
Automated Event-Driven Security
AWS makes it
easier to
automatically
react to
events that
trigger a
security
response
Points of Discovery and Reaction
• Knowns:
• Prevent from entering environment
• Detect and roll back on entry into environment
• Unknowns:
• Baseline normal behavior
• React to anomalies – alerts, investigation
Recommendations…
• Best Practices
• Lessons Learned
• Ideas
• Tools
Follow IAM Best Practices
Follow Evident IO Best Practices
The Right People
Cowboy has no
well thought out
plan or expertise
Mr. No Kills Innovation.
He is not open to new ideas.
Analysis Paralysis
Kills Productivity
Engineers = expertise + well-designed
solutions based on available data
Deployment Pipeline
DevOps, security, developer and
QA teams should all use the
same process for AWS
deployments.
Add Security Controls at this
checkpoint.
Facilitates inventory, audit and
compliance.
CICD – Continuous Integration,
Continuous Deployment
Automate Everything
From The Start.
Security Automation
• Automate Biggest Risks ~ Verizon Data Breach Report
• Automated Deployments – CloudFormation, SDKs
- Consider Immutable Infrastructure where possible
• Automated Compliance – AWS Config, AWS Inspector
• Automated Security Operations – AWS WAF, 3rd Party Tools
• Custom automation – roll your own
• Automated Intrusion Detection – Proof of Concept Framework:
https://github.com/tradichel/AWSSecurityAutomationFramework
Other Options for SSH and Access Secret Key
• IAM Roles for Users and AWS Resources
• Cross Account Roles
• Active Directory Integration
• STS – temporary credentials
• Use MFA where possible
• Consider CLI, Console and Instance Logins
• If using keys, train users that keys are passwords and treat as such
Encryption on AWS
• KMS - AWS Key Management Service
• CloudHSM - Single Tenant Hardware Security Module
• Bring Your Own Key – import from your own key manager or HSM
• AWS Certificate Manager - SSL/TLS for encryption in transit
5. Plan Network Carefully.
Internet Access AWS Only AWS to Corporate
security group
security group
security group
security group
security group
security group
Routes: Enforce Traffic Flow. Subnets: Larger. Security Groups: Whitelist.
Avoid This
So many holes in
your network and
running so many
agents that you no
longer know what is
traversing your
network anymore
and network security
is pointless.
Avoid This
Subnets with almost nothing in
them has the potential to
exhaust your IP space.
It also becomes unwieldy to
manage numerous subnets and
security groups.
Use security groups for
application specific rules.
Architect for the Cloud
Avoid Lift and Shift
Costs will be higher
Doesn’t leverage AWS
Possible Security Issues
Fix it later…right.
If you do...keep it in a
separate account.
Scalable Dev Ops
Use Process Controls
Technology can’t make your toast. Yet. Use process controls when needed.
Have a Sandbox Account
Tightly secure other accounts.
Match production or purpose built.
AWS Monitoring Tools
• VPC Flow Logs ~ like Netflow for VPC, not real time
• CloudTrail ~ Monitor actions taken on AWS
• CloudWatch ~ Any kind of logs, cannot be altered if properly secured
• 3rd Party Tools
Teri Radichel, Cloud Architect
WatchGuard Technologies ~ We are hiring!
@teriradichel
Security Certifications and Papers:
Http://www.giac.org/certified-professional/teri-radichel/140127
Thank you!

Mais conteúdo relacionado

Mais procurados

AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
Simplilearn
 

Mais procurados (20)

AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...
 
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
 
Basics AWS Presentation
Basics AWS PresentationBasics AWS Presentation
Basics AWS Presentation
 
(DVO305) Turbocharge YContinuous Deployment Pipeline with Containers
(DVO305) Turbocharge YContinuous Deployment Pipeline with Containers(DVO305) Turbocharge YContinuous Deployment Pipeline with Containers
(DVO305) Turbocharge YContinuous Deployment Pipeline with Containers
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
Security Architectures on AWS
Security Architectures on AWSSecurity Architectures on AWS
Security Architectures on AWS
 
AWS Connectivity, VPC Design and Security Pro Tips
AWS Connectivity, VPC Design and Security Pro TipsAWS Connectivity, VPC Design and Security Pro Tips
AWS Connectivity, VPC Design and Security Pro Tips
 
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
 
Getting Started with Amazon Inspector
Getting Started with Amazon InspectorGetting Started with Amazon Inspector
Getting Started with Amazon Inspector
 
Amazon Route 53 - Webinar Presentation 9.16.2015
Amazon Route 53 - Webinar Presentation 9.16.2015Amazon Route 53 - Webinar Presentation 9.16.2015
Amazon Route 53 - Webinar Presentation 9.16.2015
 
An Introduction to the AWS Well Architected Framework - Webinar
An Introduction to the AWS Well Architected Framework - WebinarAn Introduction to the AWS Well Architected Framework - Webinar
An Introduction to the AWS Well Architected Framework - Webinar
 
Designing security & governance via AWS Control Tower & Organizations - SEC30...
Designing security & governance via AWS Control Tower & Organizations - SEC30...Designing security & governance via AWS Control Tower & Organizations - SEC30...
Designing security & governance via AWS Control Tower & Organizations - SEC30...
 
Landing Zones - Creating a Foundation for Your AWS Migrations
Landing Zones - Creating a Foundation for Your AWS MigrationsLanding Zones - Creating a Foundation for Your AWS Migrations
Landing Zones - Creating a Foundation for Your AWS Migrations
 
CI/CD pipelines on AWS - Builders Day Israel
CI/CD pipelines on AWS - Builders Day IsraelCI/CD pipelines on AWS - Builders Day Israel
CI/CD pipelines on AWS - Builders Day Israel
 
AWS EC2 Fundametals
AWS EC2 FundametalsAWS EC2 Fundametals
AWS EC2 Fundametals
 
Simplify & Standardise Your Migration to AWS with a Migration Landing Zone
Simplify & Standardise Your Migration to AWS with a Migration Landing ZoneSimplify & Standardise Your Migration to AWS with a Migration Landing Zone
Simplify & Standardise Your Migration to AWS with a Migration Landing Zone
 
Security Best Practices on AWS
Security Best Practices on AWSSecurity Best Practices on AWS
Security Best Practices on AWS
 
Managing and governing multi-account AWS environments using AWS Organizations...
Managing and governing multi-account AWS environments using AWS Organizations...Managing and governing multi-account AWS environments using AWS Organizations...
Managing and governing multi-account AWS environments using AWS Organizations...
 
Introduction to AWS VPC, Guidelines, and Best Practices
Introduction to AWS VPC, Guidelines, and Best PracticesIntroduction to AWS VPC, Guidelines, and Best Practices
Introduction to AWS VPC, Guidelines, and Best Practices
 
AWS 101: Introduction to AWS
AWS 101: Introduction to AWSAWS 101: Introduction to AWS
AWS 101: Introduction to AWS
 

Destaque

Destaque (9)

Automated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWSAutomated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWS
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWS
 
Advanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAdvanced Security Best Practices Masterclass
Advanced Security Best Practices Masterclass
 
AWS re:Invent 2016: NEW SERVICE: Centrally Manage Multiple AWS Accounts with ...
AWS re:Invent 2016: NEW SERVICE: Centrally Manage Multiple AWS Accounts with ...AWS re:Invent 2016: NEW SERVICE: Centrally Manage Multiple AWS Accounts with ...
AWS re:Invent 2016: NEW SERVICE: Centrally Manage Multiple AWS Accounts with ...
 
Security Best Practices: AWS AWSome Day Management Track
Security Best Practices: AWS AWSome Day Management TrackSecurity Best Practices: AWS AWSome Day Management Track
Security Best Practices: AWS AWSome Day Management Track
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
 
AWS Account Best Practices
AWS Account Best PracticesAWS Account Best Practices
AWS Account Best Practices
 

Semelhante a AWS Security Strategy

Rackspace: Best Practices for Security Compliance on AWS
Rackspace: Best Practices for Security Compliance on AWSRackspace: Best Practices for Security Compliance on AWS
Rackspace: Best Practices for Security Compliance on AWS
Amazon Web Services
 

Semelhante a AWS Security Strategy (20)

Core strategies to develop defense in depth in AWS
Core strategies to develop defense in depth in AWSCore strategies to develop defense in depth in AWS
Core strategies to develop defense in depth in AWS
 
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017 AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
 
Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017
 
SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...
SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...
SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...
 
How to prepare for & respond to security incidents in your AWS environment
 How to prepare for & respond to security incidents in your AWS environment How to prepare for & respond to security incidents in your AWS environment
How to prepare for & respond to security incidents in your AWS environment
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS Cloud
 
Toward Full Stack Security
Toward Full Stack SecurityToward Full Stack Security
Toward Full Stack Security
 
Security Spotlight: The Coca Cola Company - CSS ATX 2017
Security Spotlight: The Coca Cola Company - CSS ATX 2017Security Spotlight: The Coca Cola Company - CSS ATX 2017
Security Spotlight: The Coca Cola Company - CSS ATX 2017
 
AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9
 
It's 10pm, Do You Know Where Your Access Keys Are?
It's 10pm, Do You Know Where Your Access Keys Are?It's 10pm, Do You Know Where Your Access Keys Are?
It's 10pm, Do You Know Where Your Access Keys Are?
 
AWS Security Essentials
AWS Security EssentialsAWS Security Essentials
AWS Security Essentials
 
Cloud Forensics and Incident Response Training.pdf
Cloud Forensics and Incident Response Training.pdfCloud Forensics and Incident Response Training.pdf
Cloud Forensics and Incident Response Training.pdf
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public Sector
 
Beginners guide to aws security monitoring
Beginners guide to aws security monitoringBeginners guide to aws security monitoring
Beginners guide to aws security monitoring
 
AWS Paris Summit 2014 - Keynote Stephen Schmidt - AWS Security
AWS Paris Summit 2014 - Keynote Stephen Schmidt - AWS SecurityAWS Paris Summit 2014 - Keynote Stephen Schmidt - AWS Security
AWS Paris Summit 2014 - Keynote Stephen Schmidt - AWS Security
 
Cloud Security and some preferred practices
Cloud Security and some preferred practicesCloud Security and some preferred practices
Cloud Security and some preferred practices
 
Rackspace: Best Practices for Security Compliance on AWS
Rackspace: Best Practices for Security Compliance on AWSRackspace: Best Practices for Security Compliance on AWS
Rackspace: Best Practices for Security Compliance on AWS
 

Mais de Teri Radichel

Mais de Teri Radichel (20)

So You Want a Job in Cybersecurity
So You Want a Job in CybersecuritySo You Want a Job in Cybersecurity
So You Want a Job in Cybersecurity
 
Cloud Offense Informs Cloud Defense.pptx
Cloud Offense Informs Cloud Defense.pptxCloud Offense Informs Cloud Defense.pptx
Cloud Offense Informs Cloud Defense.pptx
 
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
 
Real World Cloud Compromise
Real World Cloud CompromiseReal World Cloud Compromise
Real World Cloud Compromise
 
Serverless Attack Vectors
Serverless Attack VectorsServerless Attack Vectors
Serverless Attack Vectors
 
Top Priorities for Cloud Application Security
Top Priorities for Cloud Application SecurityTop Priorities for Cloud Application Security
Top Priorities for Cloud Application Security
 
Azure for Auditors
Azure for AuditorsAzure for Auditors
Azure for Auditors
 
How the Cloud Changes Cyber Security
How the Cloud Changes Cyber SecurityHow the Cloud Changes Cyber Security
How the Cloud Changes Cyber Security
 
Are you ready for a cloud pentest? AWS re:Inforce 2019
Are you ready for a cloud pentest? AWS re:Inforce 2019Are you ready for a cloud pentest? AWS re:Inforce 2019
Are you ready for a cloud pentest? AWS re:Inforce 2019
 
Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?
 
Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018
 
Top 5 Priorities for Cloud Security
Top 5 Priorities for Cloud SecurityTop 5 Priorities for Cloud Security
Top 5 Priorities for Cloud Security
 
Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018
 
Crypto Miners in the Cloud
Crypto Miners in the CloudCrypto Miners in the Cloud
Crypto Miners in the Cloud
 
Locking Down Your Cloud
Locking Down Your CloudLocking Down Your Cloud
Locking Down Your Cloud
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
 
Packet Capture on AWS
Packet Capture on AWSPacket Capture on AWS
Packet Capture on AWS
 
Security for Complex Networks on AWS
Security for Complex Networks on AWSSecurity for Complex Networks on AWS
Security for Complex Networks on AWS
 
AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016
 
Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target Breach
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

AWS Security Strategy

  • 1. AWS Security Strategy Enterprise Security on AWS Teri Radichel, Cloud Architect | WatchGuard Technologies | @teriradichel
  • 2. The CIO of the 5th largest bank in the US says they can be more secure in AWS than in their own data center. Possible?
  • 3. About That Internet Thing… You are already using shared infrastructure. How do you secure it?
  • 4. Security Policy Yours. Do you know what it says? Does everybody follow it? AWS. https://d0.awsstatic.com/whitepapers/a ws-security-whitepaper.pdf
  • 5. What’s In Your Network? Do you really know?
  • 6. Automated Configuration AWS facilitates automated infrastructure and application deployment via code stored in source control
  • 7. Automated Event-Driven Security AWS makes it easier to automatically react to events that trigger a security response
  • 8. Points of Discovery and Reaction • Knowns: • Prevent from entering environment • Detect and roll back on entry into environment • Unknowns: • Baseline normal behavior • React to anomalies – alerts, investigation
  • 9. Recommendations… • Best Practices • Lessons Learned • Ideas • Tools
  • 10. Follow IAM Best Practices
  • 11. Follow Evident IO Best Practices
  • 12. The Right People Cowboy has no well thought out plan or expertise Mr. No Kills Innovation. He is not open to new ideas. Analysis Paralysis Kills Productivity Engineers = expertise + well-designed solutions based on available data
  • 13. Deployment Pipeline DevOps, security, developer and QA teams should all use the same process for AWS deployments. Add Security Controls at this checkpoint. Facilitates inventory, audit and compliance. CICD – Continuous Integration, Continuous Deployment
  • 15. Security Automation • Automate Biggest Risks ~ Verizon Data Breach Report • Automated Deployments – CloudFormation, SDKs - Consider Immutable Infrastructure where possible • Automated Compliance – AWS Config, AWS Inspector • Automated Security Operations – AWS WAF, 3rd Party Tools • Custom automation – roll your own • Automated Intrusion Detection – Proof of Concept Framework: https://github.com/tradichel/AWSSecurityAutomationFramework
  • 16.
  • 17. Other Options for SSH and Access Secret Key • IAM Roles for Users and AWS Resources • Cross Account Roles • Active Directory Integration • STS – temporary credentials • Use MFA where possible • Consider CLI, Console and Instance Logins • If using keys, train users that keys are passwords and treat as such
  • 18. Encryption on AWS • KMS - AWS Key Management Service • CloudHSM - Single Tenant Hardware Security Module • Bring Your Own Key – import from your own key manager or HSM • AWS Certificate Manager - SSL/TLS for encryption in transit
  • 19. 5. Plan Network Carefully. Internet Access AWS Only AWS to Corporate security group security group security group security group security group security group Routes: Enforce Traffic Flow. Subnets: Larger. Security Groups: Whitelist.
  • 20. Avoid This So many holes in your network and running so many agents that you no longer know what is traversing your network anymore and network security is pointless.
  • 21. Avoid This Subnets with almost nothing in them has the potential to exhaust your IP space. It also becomes unwieldy to manage numerous subnets and security groups. Use security groups for application specific rules.
  • 22. Architect for the Cloud Avoid Lift and Shift Costs will be higher Doesn’t leverage AWS Possible Security Issues Fix it later…right. If you do...keep it in a separate account.
  • 24. Use Process Controls Technology can’t make your toast. Yet. Use process controls when needed.
  • 25. Have a Sandbox Account Tightly secure other accounts. Match production or purpose built.
  • 26.
  • 27. AWS Monitoring Tools • VPC Flow Logs ~ like Netflow for VPC, not real time • CloudTrail ~ Monitor actions taken on AWS • CloudWatch ~ Any kind of logs, cannot be altered if properly secured • 3rd Party Tools
  • 28. Teri Radichel, Cloud Architect WatchGuard Technologies ~ We are hiring! @teriradichel Security Certifications and Papers: Http://www.giac.org/certified-professional/teri-radichel/140127 Thank you!

Notas do Editor

  1. Video from AWS re:Invent 2015 where Rob Alexander was the keynote speaker.
  2. AWS Security Process Overview: https://d0.awsstatic.com/whitepapers/aws-security-whitepaper.pdf
  3. Top 5 Critical Controls: https://www.cisecurity.org/critical-controls.cfm Deski Network Suite on left. AWS Web Console on right.
  4. Sample architecture from AWS Case Studies: https://aws.amazon.com/solutions/case-studies/
  5. Paper on Security Automation in AWS: https://www.sans.org/reading-room/whitepapers/incident/balancing-security-innovation-event-driven-automation-36837
  6. AWS IAM Best Practices: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html Code Spaces ~ The company that got deleted. http://www.networkcomputing.com/cloud-infrastructure/code-spaces-lesson-cloud-backup/314805651
  7. Evident IO Blog with Security Best Practices: http://blogs.evident.io
  8. Images: Shutterstock, Meme Generator
  9. Target was likely compromised via a deployment system: https://www.sans.org/reading-room/whitepapers/casestudies/case-study-critical-controls-prevented-target-breach-35412
  10. AWS CloudFormation: https://aws.amazon.com/cloudformation/
  11. AWS Tools: https://aws.amazon.com/tools/ AWS Config: https://aws.amazon.com/config/ AWS WAF: https://aws.amazon.com/waf/ Verizon Data Breach Report: http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
  12. KMS: https://aws.amazon.com/kms/ CloudHSM: https://aws.amazon.com/cloudhsm/ AWS Certificate Manager: https://aws.amazon.com/certificate-manager/ Bring your own key: https://aws.amazon.com/blogs/aws/new-bring-your-own-keys-with-aws-key-management-service/ This new feature allows you to import keys from any key management and HSM (Hardware Security Module) solution that supports the RSA PKCS #1 standard, and use them with the AWS services and your own applications. Protecting Data At Rest on AWS: https://d0.awsstatic.com/whitepapers/AWS_Securing_Data_at_Rest_with_Encryption.pdf AWS Security Blog ~ Encryption: https://blogs.aws.amazon.com/security/blog/category/Encryption
  13. AWS Best Practices ~ Architecting for the Cloud: https://aws.amazon.com/whitepapers/architecting-for-the-aws-cloud-best-practices/
  14. Don’t be a bottleneck image: http://digital.library.unt.edu/ark:/67531/metadc182/
  15. Images from 6 Ways to Make Toast – Wikihow http://www.wikihow.com/Make-Toast AWS Compliance White Paper: https://d0.awsstatic.com/whitepapers/compliance/AWS_Risk_and_Compliance_Whitepaper.pdf
  16. Image: http://www.markramseymedia.com/wp-content/uploads/2011/02/sandbox.jpg
  17. VPC Flow Logs: http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/flow-logs.html CloudTrail: https://aws.amazon.com/cloudtrail/ CloudWatch: https://aws.amazon.com/cloudwatch/